{"id":15808,"date":"2026-02-16T08:05:17","date_gmt":"2026-02-16T08:05:17","guid":{"rendered":"https:\/\/newestek.com\/?p=15808"},"modified":"2026-02-16T08:05:17","modified_gmt":"2026-02-16T08:05:17","slug":"ciso-julie-chatman-wants-to-help-you-take-control-of-your-security-leadership-role","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=15808","title":{"rendered":"CISO Julie Chatman wants to help you take control of your security leadership role"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>Julie Chatman never planned to get into cybersecurity. In fact, she believes most don\u2019t but are mentored into it, as she was.<\/p>\n<p>Chatman started her professional career as a Navy Hospital Corpsman, specializing in medical laboratory science and technology \u2014 a core part of medical diagnostics. \u201cI analyzed blood work, monitoring quality control, ensuring accuracy in life-or-death results. That precision and systems thinking translates directly to how I approach cybersecurity today,\u201d she tells CSO.<\/p>\n<p>After three US Navy enlistments, Chatman joined the FBI as a budget analyst for the Office of the CIO. \u201cBudget analysis wasn\u2019t my end goal, but it taught me how technology investments get made in large organizations,\u201d she says. \u201cI learned the language of ROI, risk, and resource allocation \u2014 all critical for cybersecurity leadership.\u201d<\/p>\n<p>That foundation proved valuable when a senior leader tapped her for a high-stakes project: digitizing the FBI\u2019s paper-based classified informant files.<\/p>\n<p>\u201cThe FBI ran on paper with more than 50 field offices, more than 20 legal attach\u00e9 offices, and multiple covert sites worldwide,\u201d Chatman explains. \u201cWe had to implement the agency\u2019s first role-based access controls, PKI infrastructure, and digital signatures while managing change across thousands of personnel who\u2019d never worked this way before.\u201d<\/p>\n<p>The project combined enterprise cybersecurity, organizational change management, and operational security on a massive scale. Its success opened doors to progressively senior roles, ultimately leading to her position as a cybersecurity and risk leader within the FBI.<\/p>\n<p>From the FBI, Chatman moved into strategic advisory roles with Deloitte, GSK, and McKinsey, where she led cybersecurity transformations for Fortune 100 companies, advised on multi-billion-dollar corporate demergers, and authored foundational crisis management frameworks. She has since served as CISO for healthcare and federal contractors, and now runs ResilientTech Advisors, a cybersecurity consulting firm. Throughout her career, she has prioritized mentoring emerging cybersecurity professionals.<\/p>\n<p>CSO spoke to <a href=\"https:\/\/www.linkedin.com\/in\/julie-chatman-mba-infosec\/\">Julie Chatman<\/a> about how the CISO role is changing and how security leaders can navigate challenges specific to the role. Following is that conversation, edited for length and clarity.<\/p>\n<p><strong>What are some of the challenges CISOs or cybersecurity leaders are facing today?<\/strong><\/p>\n<p><strong>Chatman:<\/strong> There are a couple of challenges \u2014 some old, some new.<\/p>\n<p>The old challenge is getting people to understand that security matters. And when I say people, I mean colleagues, C-level leaders, everyone in your environment. Security often feels like friction, it gets in the way of getting work done. People will work around things that slow them down, including security controls. That\u2019s the fundamental tension.<\/p>\n<p>The second challenge is funding. Because of that first challenge, leaders often don\u2019t see cybersecurity budget requests as necessary until something goes wrong.<\/p>\n<p>The third challenge is modern: <a href=\"https:\/\/www.csoonline.com\/article\/4101936\/ignoring-ai-in-the-threat-chain-could-be-a-costly-mistake-experts-warn.html\">AI-enabled adaptive attacks<\/a>. We\u2019ve always had emerging technology, but AI is different because it can mimic human intelligence to some extent. Now we\u2019re dealing with attacks that change their behavior based on who they\u2019re targeting. No one planned for that.<\/p>\n<p>And then there\u2019s <a href=\"https:\/\/www.csoonline.com\/article\/3631759\/personal-liability-sours-70-of-cisos-on-their-role.html\">personal liability<\/a>. In a few high-profile cases, security leaders have <a href=\"https:\/\/www.csoonline.com\/article\/4109992\/what-cisos-should-know-about-the-solarwinds-lawsuit-dismissal.html\">faced criminal charges<\/a> for how they handled breach disclosures, and civil enforcement for how they reported risks to investors and regulators. The trend is toward holding CISOs personally accountable for governance and disclosure decisions. But here\u2019s the problem: CISOs often <a href=\"https:\/\/www.csoonline.com\/article\/3602722\/the-ciso-paradox-with-great-responsibility-comes-little-or-no-power.html\">don\u2019t have the authority to match that accountability<\/a>. You tell leadership, \u2018We need this control\u2019 and you\u2019re told to stop asking. Then something happens. Guess who gets blamed? CISO can also mean chief scapegoat.<\/p>\n<p>It\u2019s getting harder to convince younger people to sign up for this job.<\/p>\n<p><strong>Are you seeing that happen? Have you noticed people avoiding the job or just being afraid because of these recent cases?<\/strong><\/p>\n<p><strong>Chatman: <\/strong>Yes, absolutely. There are other ways to make money without this level of stress and exposure.<\/p>\n<p>Think about the typical setup: You\u2019re a C-level executive, but you report to another C-level who controls your budget. They have D&amp;O [directors and officers] insurance coverage. <a href=\"https:\/\/www.csoonline.com\/article\/2512968\/if-youre-a-ciso-without-do-insurance-you-may-need-to-fight-for-it.html\">You might not<\/a>. They cut your cybersecurity budget. Then when there\u2019s a breach, they blame you and you\u2019re personally exposed while they\u2019re protected.<\/p>\n<p>Who would sign up for that?<\/p>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/4016334\/has-ciso-become-the-least-desirable-role-in-business.html\">The role is becoming less attractive<\/a>. You\u2019re seeing the rise of fractional CISOs, virtual CISOs, heads of IT security instead of full CISO titles. It\u2019s a lot harder to hold a fractional CISO personally liable. This is relatively new. The liability conversation really intensified after some high-profile enforcement actions, and now we\u2019re seeing the market respond.<\/p>\n<p><strong>What can the cybersecurity industry do to fight the liability trend we\u2019re seeing?<\/strong><\/p>\n<p><strong>Chatman: <\/strong>There are advocacy groups pushing back, but realistically, if regulators want to hold people liable, they will. So maybe it\u2019s less about fighting the trend and more about navigating it as an individual \u2014 at least for now.<\/p>\n<p>First, negotiate protection upfront. When you\u2019re thinking about accepting a CISO role, explicitly <a href=\"https:\/\/www.csoonline.com\/article\/2505459\/how-cisos-can-protect-their-personal-liability.html\">ask about D&amp;O insurance coverage<\/a>. If the CISO is not considered a director or an officer of the company and can\u2019t be given D&amp;O coverage, will the company subsidize individual coverage? There are companies now selling CISO-specific policies. Make this part of your compensation negotiation.<\/p>\n<p>Second, do your job well but understand the paradox. Sometimes when you do your job properly, you\u2019re labeled \u2018the office of no,\u2019 you\u2019re seen as \u2018difficult,\u2019 and you last 18 months. It\u2019s a catch-22.<\/p>\n<p>Real liability protection is changing how your organization thinks about risk ownership. Most organizations don\u2019t have a unified view of risk or the vocabulary to discuss it properly. If you can advance that as a CISO, you can help the business understand that risk is theirs to accept, not yours.<\/p>\n<p>Here\u2019s what that looks like in practice: Someone says, \u2018I don\u2019t want to implement this control; it\u2019s too expensive.\u2019 That\u2019s fine but someone has to formally accept that risk. And it\u2019s not you. It\u2019s the business owner, the data owner, the product owner. Document it in your GRC tool, create a process, get sign-off.<\/p>\n<p>I see CISOs get in trouble when they take on risk that doesn\u2019t belong to them. They act like they have veto power. They say, \u2018I\u2019m blocking this\u2019 or \u2018You can\u2019t do that.\u2019 That puts them in the position of accepting risk that isn\u2019t theirs to accept.<\/p>\n<p>Instead, say: \u2018We have a risk appetite and risk tolerance. This decision falls outside those parameters. I need you to formally accept this risk.\u2019 That\u2019s a conversation. You\u2019re not telling them no; you\u2019re asking them to own their choice.<\/p>\n<p>But this requires a culture shift in the cybersecurity community. A lot of us aren\u2019t used to being heard, so we just talk louder. That\u2019s not business leadership.<\/p>\n<p>Every CISO needs to remember they\u2019re a business leader first. That means thinking about ROI, operational friction, and production impact. No more \u2018we need to do this because it\u2019s the right thing to do.\u2019 That\u2019s great in a movie, but you\u2019re running a business function. Businesses run on tradeoffs.<\/p>\n<p><strong>How do you balance the organization\u2019s investment in cyber with the needs to protect the business?<\/strong><\/p>\n<p><strong>Chatman: <\/strong>It depends on how much voice you have as the CISO. In some organizations, the CISO has no seat at the table. The CIO and other C-levels make budget decisions behind closed doors, then the CIO tells you what you\u2019re getting. But regardless of your organization structure, the best practice is to articulate value in a way stakeholders can receive it. And before you even get to budget conversations, establish yourself as a partner, not just a cost center.<\/p>\n<p>One thing I do when joining an organization is audit the existing tools. Are we paying for things we don\u2019t use? Are we double-paying for overlapping capabilities? I can usually find a couple hundred thousand dollars in savings pretty quickly. That makes you friends in the CFO\u2019s office fast.<\/p>\n<p>When it comes to the budget, be honest about what you need and transparent about what happens if you don\u2019t get it. I also recommend building three versions of your budget:<\/p>\n<ul class=\"wp-block-list\">\n<li>First, the hopes-and-dreams budget: What would it take to close all the known gaps and operate proactively?<\/li>\n<li>Second, the could-live-with-this budget: What\u2019s realistic and gets you to acceptable risk levels?<\/li>\n<li>Third, the I-think-I\u2019m-going-to-resign budget: Because you can see a breach coming and you don\u2019t want your name attached to it.<\/li>\n<\/ul>\n<p>You probably won\u2019t end up at that last one, but all your stakeholders need to understand what\u2019s at stake at each level. And you need to show them how past investments translated into outcomes \u2014 what you achieved, what you prevented.<\/p>\n<p>That\u2019s critical because people say the cybersecurity budget is a black hole. Cybersecurity works best when nothing happens. Your performance indicator is literally zero incidents. That\u2019s a tough sell, but it\u2019s reality.<\/p>\n<p><strong>How do you deal with AI-enabled attacks?<\/strong><\/p>\n<p><strong>Chatman: <\/strong>Every cybersecurity professional, up to and including CISOs, needs to understand how AI works. Some people thought AI was hype and delayed learning about it. Now everyone realizes it\u2019s not going away, and if you don\u2019t understand the technology, you can\u2019t defend against it.<\/p>\n<p>You also need to update your security awareness training to reflect AI threats. That means covering deepfakes, AI-enhanced business email compromise, adaptive attacks that change based on the target. Your training programs need to evolve with the threat landscape.<\/p>\n<p>And here\u2019s something that often gets overlooked: CISOs need to be more accessible right now. AI makes attacks more convincing and harder to spot. Your employees need to feel comfortable reporting suspicious activity without fear of looking stupid. If someone thinks they might have fallen for a deepfake or an AI-generated phishing attempt, you want them to come to you immediately, not hide it because they\u2019re embarrassed.<\/p>\n<p>My message to cyber professionals here is: Remember, you weren\u2019t always a cybersecurity expert. You learned this over time. So, meet people where they are. Skip the jargon. Explain things in plain language. If people can\u2019t understand you, they can\u2019t help you defend the organization.<\/p>\n<p><strong>Tell me about your mentoring experience.<\/strong><\/p>\n<p><strong>Chatman: <\/strong>I\u2019ve mentored and coached a lot of people, both one-on-one and in groups.<\/p>\n<p>For example, in 2021, I created a free five-part series called <a href=\"https:\/\/www.youtube.com\/channel\/UCaFsBfsNrJR9x4RIRLxFMDw\">Cyber Career Differentiators<\/a>, \u00a0basically business acumen and soft skills for technologists. There are boot camps everywhere teaching people how to configure firewalls, but nobody\u2019s teaching technologists how to make eye contact with businesspeople and have actual conversations. So, I built that curriculum and put it out there and 516 people took the class.<\/p>\n<p>Beyond that, I do ongoing one-on-one mentoring, and I run a coaching firm now focused on developing cybersecurity leaders.<\/p>\n<p><strong>What are you most proud of in your career?<\/strong><\/p>\n<p><strong>Chatman: <\/strong>Earlier I said that cyber professionals are shying away from the CISO role. It\u2019s getting harder to convince people to sign up for this job. But here\u2019s what I\u2019m most proud of: People tell me I inspire them to join cybersecurity. The feedback I get is that I\u2019m relatable, practical, and human.<\/p>\n<p>I think people can see that I care about the human beings behind the technology. That\u2019s why I\u2019ve never run an \u2018office of no.\u2019 \u2018No\u2019 is the first word most babies learn, and it\u2019s a favorite word in cybersecurity. But it doesn\u2019t come naturally to me. That\u2019s not to say I\u2019m permissive \u2014 I ask hard questions, I dig into the details, I challenge assumptions. However, I always start by listening.<\/p>\n<p>What I\u2019m most proud of is being an example for people who feel intimidated by this field. I started in medical diagnostics. If I can become a CISO, then anyone with the right blend of curiosity and commitment can build a successful career in cybersecurity.<\/p>\n<p>That matters more to me than any technical accomplishment, any FBI project, anything else I\u2019ve done. Inspiring others to see this as possible for them \u2014 that\u2019s what I\u2019m proud of.<\/p>\n<p><strong>Is there a quote that you are inspired by?<\/strong><\/p>\n<p><strong>Chatman:<\/strong> \u2018Strength is not found in systems that never fail. But in those built to recover smarter, faster, and stronger.\u2019<\/p>\n<p><strong>Are there any books you\u2019ve learned from that you would like to suggest to others?<\/strong><\/p>\n<p><strong>Chatman: <\/strong><em>World War Z<\/em> by Max Brooks. It\u2019s a collection of short stories set during a zombie apocalypse, but the zombie part is just a placeholder. What makes it valuable is how it examines different facets of society under stress \u2014 government, military, finance, global supply chains and logistics, medicine \u2014 including organ donation and transplantation, pharmaceuticals, and more.<\/p>\n<p>The book isn\u2019t really about zombies. It\u2019s about how systems break down when infrastructure fails. What happens when we lose basic services \u2014 grocery stores, pharmacies, hospitals, law enforcement \u2014 all the things we take for granted?<\/p>\n<p>Every time I read it, I see something new about how to think as a technologist. For example, the logistics chapters: How do supply chains collapse? How do people get stranded when transportation systems fail? I need to understand these dependencies because all of them are enabled by technology. The book is an interesting look into how things work when they\u2019re functioning and what breaks first when they\u2019re not.<\/p>\n<p>I\u2019m fascinated by this genre because it shows what happens when technology fails at scale. We had a taste of that with the <a href=\"https:\/\/www.csoonline.com\/article\/3478147\/crowdstrike-debacle-underscores-importance-of-having-a-plan.html\">CrowdStrike incident<\/a>. People couldn\u2019t access their bank accounts, couldn\u2019t fly home. That\u2019s a glimpse of what systemic failure looks like.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n<p><a id=\"_msocom_1\"><\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Julie Chatman never planned to get into cybersecurity. In fact, she believes most don\u2019t but are mentored into it, as she was. Chatman started her professional career as a Navy Hospital Corpsman, specializing in medical laboratory science and technology \u2014 a core part of medical diagnostics. \u201cI analyzed blood work, monitoring quality control, ensuring accuracy in life-or-death results. That precision and systems thinking translates directly&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=15808\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15808","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15808","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15808"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15808\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15808"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15808"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15808"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}